Networking Hardware Review Quiz: Trivia

Approved & Edited by ProProfs Editorial Team
At ProProfs Quizzes, our dedicated in-house team of experts takes pride in their work. With a sharp eye for detail, they meticulously review each quiz. This ensures that every quiz, taken by over 100 million users, meets our standards of accuracy, clarity, and engagement.
Learn about Our Editorial Process
| Written by 1ghosttechno
1
1ghosttechno
Community Contributor
Quizzes Created: 2 | Total Attempts: 356
Questions: 25 | Attempts: 218

SettingsSettingsSettings
Networking Hardware Review Quiz: Trivia - Quiz


Networking hardware review quiz: trivia. A network connection between computers ensures that they can communicate with each other with ease and if you are looking to set up a network some of the equipment you may need include routers, hubs, switches and bridges. Do take this quiz and get to see how well you know these types of equipment, in what sizes and how to use them effectively as you set up the network.


Questions and Answers
  • 1. 

    You are the network administrator for a rapidly growing company with a 100BaseT network. Users have recently complained about slow file transfers. In a check of network traffic, you discover a high number of collisions. Which connectivity device would best reduce the number of collisions and provide for future growth?

    • A. 

      Bridge

    • B. 

      Repeater

    • C. 

      Hub

    • D. 

      Switch

    • E. 

      Gateway

    • F. 

      Router

    Correct Answer
    D. Switch
    Explanation
    A switch would best reduce the number of collisions and provide for future growth in this scenario. A switch is a connectivity device that operates at the data link layer of the OSI model and uses MAC addresses to forward data packets only to the intended recipient. Unlike a hub, which broadcasts data to all connected devices, a switch creates separate collision domains for each port, reducing the likelihood of collisions. Additionally, a switch can handle higher network traffic loads and provide better performance compared to a hub. Therefore, implementing a switch would help alleviate the issue of slow file transfers caused by collisions and support the company's future growth.

    Rate this question:

  • 2. 

    Which frame processing method causes a switch to wait until the first 64 bytes of the frame has been received before forwarding the frame to the destination device?

    • A. 

      Adaptive

    • B. 

      Store and forward

    • C. 

      Cut through

    • D. 

      Fragment free

    Correct Answer
    D. Fragment free
    Explanation
    Fragment free is the frame processing method that causes a switch to wait until the first 64 bytes of the frame has been received before forwarding the frame to the destination device. This method is designed to prevent forwarding of frames with errors by checking the first 64 bytes for any errors or collisions. Once this initial portion of the frame is received without errors, the switch forwards the entire frame to the destination device.

    Rate this question:

  • 3. 

    You are in the process of configuring a new router. You have configured a hostname and ip domain name for the router. You continue with the following commands: RouterA(config)#enable secret highway RouterA(config)#username admin password television RouterA(config)#crypto key generate rsa RouterA(config)#aaa new-model RouterA(config-line)#login RouterA(config-line)#line vty 0 4 RouterA(config-line)#password garage RouterA(config-line)#transport input ssh RouterA(config)#line con 0 RouterA(config-line)#password airplane What would you do to establish a remote console session with the router? 

    • A. 

      Use garage for the password

    • B. 

      Run Telnet

    • C. 

      Use highway for the password

    • D. 

      Use airplane for the password

    • E. 

      Use admin for a username and television for the password

    • F. 

      Run SSH

    • G. 

      Run a terminal emulation program

    Correct Answer(s)
    E. Use admin for a username and television for the password
    F. Run SSH
    Explanation
    To establish a remote console session with the router, you would use "admin" as the username and "television" as the password. Additionally, you would need to run SSH (Secure Shell) to establish the secure connection. This would allow you to remotely access and manage the router's console.

    Rate this question:

  • 4. 

    What primary advantages does the 802.1Q Trunking Protocol offer compared to ISL?

    • A. 

      Can be used with a mix of Cisco and non-Cisco devices

    • B. 

      Performed by ASIC

    • C. 

      IEEE standard

    • D. 

      Supports multiple spanning-tree instances per switch

    • E. 

      Encapsulates the entire data-link frame between the tag header and trailer

    Correct Answer(s)
    A. Can be used with a mix of Cisco and non-Cisco devices
    C. IEEE standard
    Explanation
    The 802.1Q Trunking Protocol offers the primary advantage of being able to be used with a mix of Cisco and non-Cisco devices. This means that it is compatible with a wider range of devices and allows for greater flexibility in network design and implementation. Additionally, being an IEEE standard, it ensures interoperability and compatibility with other networking equipment.

    Rate this question:

  • 5. 

    You are a field technician for a large company. You have been sent to a remote site to troubleshoot a downed router. When you arrive at the remote site, how will you connect your laptop to the router?

    • A. 

      Connect the laptop's COM port to the router's console port using a rollover cable.

    • B. 

      Connect the laptop's Ethernet port to the router's Ethernet port using a crossover cable.

    • C. 

      Connect the laptop's Ethernet port to the router's Ethernet port using a straight-through cable.

    • D. 

      Connect the laptop's Ethernet port to the router's Ethernet port using a rollover cable.

    • E. 

      Connect the laptop's COM port to the router's console port using a crossover cable.

    • F. 

      Connect the laptop's COM port to the router's Ethernet port using a straight-through cable.

    • G. 

      Connect the laptop's COM port to the router's console port using a straight-through cable.

    Correct Answer(s)
    A. Connect the laptop's COM port to the router's console port using a rollover cable.
    B. Connect the laptop's Ethernet port to the router's Ethernet port using a crossover cable.
    Explanation
    The correct answer is to connect the laptop's COM port to the router's console port using a rollover cable and to connect the laptop's Ethernet port to the router's Ethernet port using a crossover cable. This is because the COM port is used for console management and configuration of the router, while the Ethernet port is used for data transmission. The rollover cable is specifically designed for connecting the COM port to the console port, while the crossover cable is used to connect similar devices, such as a laptop and a router, together.

    Rate this question:

  • 6. 

    You need to back up the current IOS image on your router to the TFTP server. The TFTP server's IP address is 192.56.145.23. Which of the following commands do you use?

    • A. 

      Backup tftp 192.56.145.23 flash IOSBackup

    • B. 

      Copy flash tftp 192.56.145.23

    • C. 

      Backup flash tftp 192.56.145.23

    • D. 

      Copy flash tftp

    • E. 

      Backup flash tftp

    Correct Answer
    D. Copy flash tftp
    Explanation
    The correct answer is "copy flash tftp". This command is used to copy the IOS image from the router's flash memory to the TFTP server with the specified IP address. The "copy" command is used to copy files, the "flash" keyword specifies the source file location in the router's flash memory, and "tftp" specifies the destination server.

    Rate this question:

  • 7. 

    Shown here is a diagram of the back of a sample router. If port C is the console port, what type of cable and connector would you use to connect to the console port?

    • A. 

      DB-60 DCE cable

    • B. 

      DB-60 DTE cable

    • C. 

      RJ-45 crossover cable

    • D. 

      RJ-11 straight-through cable

    • E. 

      RJ-45 straight-through cable

    • F. 

      RJ-45 rollover cable

    Correct Answer
    F. RJ-45 rollover cable
    Explanation
    The correct answer is RJ-45 rollover cable. The console port on a router typically uses an RJ-45 connector, and a rollover cable is used to connect to it. A rollover cable is a special type of Ethernet cable where the pinouts on one end are reversed compared to the other end. This allows the router's console port to communicate with a computer or terminal using a serial connection.

    Rate this question:

  • 8. 

    You are designing a routing solution for your organization. You want to improve routing efficiency by ensuring that routers save frequently used data link headers used to encapsulate packets. Which types of routing logic could you implement?

    • A. 

      Fragment Free

    • B. 

      Store and Forward

    • C. 

      Process Switching

    • D. 

      Cisco Express Forwarding

    • E. 

      Fast Switching

    Correct Answer(s)
    D. Cisco Express Forwarding
    E. Fast Switching
    Explanation
    By implementing Cisco Express Forwarding and Fast Switching, you can improve routing efficiency by enabling routers to save frequently used data link headers used to encapsulate packets. Cisco Express Forwarding uses a Forwarding Information Base (FIB) to store precomputed next-hop information, allowing for faster packet forwarding. Fast Switching, on the other hand, stores a cache of commonly used destination addresses, allowing for quicker processing of packets. By using these routing logic methods, routers can minimize the time and resources required for routing, resulting in improved efficiency.

    Rate this question:

  • 9. 

    Which of the following statements apply only to extended IP access lists and not to both standard and extended lists?

    • A. 

      You can filter traffic for a specific TCP/IP protocol.

    • B. 

      You can assign more than one list to each interface.

    • C. 

      You can log traffic that matches access list entries.

    • D. 

      You can filter traffic based on source IP addresses.

    • E. 

      You can either permit or deny TCP/IP traffic.

    • F. 

      You can filter traffic based on destination IP addresses.

    Correct Answer(s)
    A. You can filter traffic for a specific TCP/IP protocol.
    F. You can filter traffic based on destination IP addresses.
    Explanation
    Extended IP access lists allow you to filter traffic for a specific TCP/IP protocol and filter traffic based on destination IP addresses. Standard and extended lists both allow you to assign more than one list to each interface, log traffic that matches access list entries, filter traffic based on source IP addresses, and permit or deny TCP/IP traffic. Therefore, the statements that apply only to extended IP access lists and not to both standard and extended lists are "You can filter traffic for a specific TCP/IP protocol" and "You can filter traffic based on destination IP addresses."

    Rate this question:

  • 10. 

    Which of the following is the most important thing to do to prevent console access to the router?

    • A. 

      Disconnect the console cable when not in use.

    • B. 

      Set console and enable secret passwords.

    • C. 

      Implement an access list to prevent console connections.

    • D. 

      Keep the router in a locked room

    Correct Answer
    D. Keep the router in a locked room
    Explanation
    Keeping the router in a locked room is the most important thing to do to prevent console access to the router. This ensures that only authorized personnel have physical access to the router, reducing the risk of unauthorized console connections. Disconnecting the console cable when not in use and setting console and enable secret passwords are also important security measures, but they do not provide the same level of physical protection as keeping the router in a locked room. Implementing an access list can help control network access, but it does not specifically address console access.

    Rate this question:

  • 11. 

    Which two of the following lists accurately describes TCP and UDP?

    • A. 

      TCP: connection-oriented, reliable, sequenced, high overhead

    • B. 

      TCP: connection-oriented, reliable, unsequenced, low overhead

    • C. 

      UDP: connectionless, unreliable, unsequenced, low overhead

    • D. 

      UDP: connectionless, reliable, sequenced, low overhead

    • E. 

      UDP: connection-oriented, reliable, sequenced, high overhead

    • F. 

      TCP: connectionless, unreliable, unsequenced, low overhead

    Correct Answer(s)
    A. TCP: connection-oriented, reliable, sequenced, high overhead
    C. UDP: connectionless, unreliable, unsequenced, low overhead
    Explanation
    TCP is a connection-oriented protocol that ensures reliable and sequenced delivery of data, but it has a high overhead due to the additional control mechanisms it employs. On the other hand, UDP is a connectionless protocol that does not guarantee reliability or sequencing of data. It has a low overhead since it does not have the same level of control mechanisms as TCP. Therefore, the given answer accurately describes the characteristics of TCP and UDP.

    Rate this question:

  • 12. 

    You want to save the configuration file in NVRAM to a TFTP server with address 192.168.1.10 to be used as a backup. Which command would you use?

    • A. 

      Copy tftp start

    • B. 

      Copy tftp run

    • C. 

      Copy start tftp 192.168.1.10

    • D. 

      Copy run tftp

    • E. 

      Copy start tftp

    Correct Answer
    E. Copy start tftp
    Explanation
    The correct answer is "copy start tftp" because this command is used to copy the startup configuration file from NVRAM to a TFTP server. In this case, the TFTP server has the IP address 192.168.1.10. By using this command, the configuration file will be saved as a backup on the TFTP server for future use.

    Rate this question:

  • 13. 

    Which of the following best describes how a switch functions?

    • A. 

      It connects multiple segments of different architectures. It translates packets and forwards them to the appropriate segment.

    • B. 

      It segments the network and forwards packets based on logical addresses.

    • C. 

      It connects multiple segments and broadcast packets to all of its ports.

    • D. 

      It connects multiple network segments and forwards packets to the appropriate segment.

    • E. 

      It filters the network traffic based on hardware addresses.

    Correct Answer(s)
    D. It connects multiple network segments and forwards packets to the appropriate segment.
    E. It filters the network traffic based on hardware addresses.
    Explanation
    A switch functions by connecting multiple network segments and forwarding packets to the appropriate segment. Additionally, it filters the network traffic based on hardware addresses.

    Rate this question:

  • 14. 

    You manage a small network with two buildings, 1,000 meters apart. You want to connect the two buildings together with a switch. You are concerned about electromagnetic interference on the cable connecting the two buildings.

    • A. 

      Twisted pair cables with RJ-45 connectors

    • B. 

      1000BaseSX Ethernet

    • C. 

      1000BaseLX Ethernet

    • D. 

      Fiber optic cables with LC connectors

    • E. 

      1000BaseCX Ethernet

    Correct Answer(s)
    C. 1000BaseLX Ethernet
    D. Fiber optic cables with LC connectors
    Explanation
    Fiber optic cables with LC connectors are the best choice for connecting the two buildings in order to minimize electromagnetic interference. Fiber optic cables use light signals to transmit data, which is immune to electromagnetic interference. Additionally, LC connectors provide a secure and reliable connection between the cables and the switch. 1000BaseLX Ethernet is the appropriate type of Ethernet for this setup, as it supports long-distance transmissions over fiber optic cables.

    Rate this question:

  • 15. 

    You want to establish a console session to a new router using a Telnet session. Which of the following components will you need?

    • A. 

      Ethernet port

    • B. 

      Rollover cable

    • C. 

      Console port

    • D. 

      Serial port

    • E. 

      IP address

    • F. 

      Ethernet cable

    Correct Answer(s)
    A. Ethernet port
    E. IP address
    F. Ethernet cable
    Explanation
    To establish a console session to a new router using a Telnet session, you will need an Ethernet port on your computer to connect to the router. An IP address is also required to establish the connection. Additionally, an Ethernet cable is needed to physically connect the computer and the router. The other options mentioned, such as the rollover cable, console port, and serial port, are not necessary for establishing a Telnet session.

    Rate this question:

  • 16. 

    Shown here is a diagram of the back of a sample router. Which port would you use if you wanted to connect the router to a CSU/DSU using a serial connection?

    • A. 

      A

    • B. 

      B

    • C. 

      C

    • D. 

      D

    • E. 

      E

    Correct Answer
    E. E
    Explanation
    The correct answer is E. The E port is typically used for connecting a router to a CSU/DSU using a serial connection. CSU/DSU stands for Channel Service Unit/Data Service Unit, which is a device used for connecting a router to a digital circuit, such as a T1 or T3 line. Serial connections are commonly used for long-distance connections and require a specific port on the router for proper communication.

    Rate this question:

  • 17. 

    Which of the following methods helps to detect lost packets?

    • A. 

      Buffering

    • B. 

      Flow control

    • C. 

      Sequencing

    • D. 

      Acknowledgements

    • E. 

      CRC

    Correct Answer(s)
    C. Sequencing
    D. Acknowledgements
    Explanation
    Sequencing helps to detect lost packets by assigning a unique sequence number to each packet. When the receiver receives the packets, it can check if any packets are missing by comparing the received sequence numbers with the expected sequence numbers. If there is a gap in the sequence numbers, it indicates that some packets were lost. Acknowledgements also help in detecting lost packets by requiring the receiver to send an acknowledgment message back to the sender for each received packet. If the sender does not receive an acknowledgment for a particular packet, it can assume that the packet was lost.

    Rate this question:

  • 18. 

    You want to prevent collisions on your network by creating separate collision domains and defining virtual LANs. Which of the following devices should you choose?

    • A. 

      Router

    • B. 

      Bridge

    • C. 

      Switch

    • D. 

      Active hub

    Correct Answer
    C. Switch
    Explanation
    A switch is the best choice for preventing collisions on a network by creating separate collision domains and defining virtual LANs. A switch operates at the data link layer of the OSI model and uses MAC addresses to forward data only to the intended recipient. This allows for dedicated bandwidth for each device connected to the switch, reducing the chances of collisions. Additionally, switches can be configured to create virtual LANs (VLANs), which further segregate network traffic and enhance security.

    Rate this question:

  • 19. 

    You have several hosts, a switch, and a router as shown in the exhibit. Workstation2 sends an IP packet to Workstation3. Which default gateway address is used by Workstation2?

    • A. 

      192.168.11.11

    • B. 

      192.168.10.2

    • C. 

      192.168.11.1

    • D. 

      192.168.10.1

    Correct Answer
    D. 192.168.10.1
    Explanation
    Workstation2 will use the default gateway address 192.168.10.1. The default gateway is the IP address of the router that connects the local network to external networks. In this scenario, the router with the IP address 192.168.10.1 is the default gateway for Workstation2.

    Rate this question:

  • 20. 

    Which of the following best describes a Switch Virtual Interface (SVI) on a multi-layer switch?

    • A. 

      A SVI is configured with an IP address and is not associated with a particular VLAN.

    • B. 

      A multi-layer switch treats a SVI as a physical link through which it can route traffic.

    • C. 

      A SVI behaves like a regular router interface except that it does not support sub-interfaces.

    • D. 

      A SVI is mostly implemented to interconnect the VLANs between distribution and access switches in a multi-switched network.

    • E. 

      In a multi-switched network, SVIs connect core- and distribution-layer switches.

    Correct Answer(s)
    B. A multi-layer switch treats a SVI as a physical link through which it can route traffic.
    D. A SVI is mostly implemented to interconnect the VLANs between distribution and access switches in a multi-switched network.
    Explanation
    A Switch Virtual Interface (SVI) on a multi-layer switch is treated as a physical link through which the switch can route traffic. It is mostly implemented to interconnect the VLANs between distribution and access switches in a multi-switched network. This means that the SVI acts as a virtual interface that allows communication between different VLANs on the network. It is not associated with a particular VLAN and does not support sub-interfaces.

    Rate this question:

  • 21. 

    Which two of the following statements about routers are true?

    • A. 

      They examine the destination device address contained in frames to make routing decisions.

    • B. 

      They use logical network and device addresses to route data between networks.

    • C. 

      They examine the destination device address contained in packets to make routing decisions.

    • D. 

      They operate at the OSI Data Link layer.

    • E. 

      They operate at the OSI Transport layer.

    Correct Answer(s)
    B. They use logical network and device addresses to route data between networks.
    C. They examine the destination device address contained in packets to make routing decisions.
    Explanation
    Routers use logical network and device addresses to route data between networks. They examine the destination device address contained in packets to make routing decisions.

    Rate this question:

  • 22. 

    Which command do you use to copy a file named ATL-1.cfg on a TFTP server to the running-config on the router?

    • A. 

      Copy run tftp ATL-1.cfg

    • B. 

      Copy ATL-1.cfg run

    • C. 

      Copy ATL-1.cfg tftp run

    • D. 

      Copy tftp ATL-1.cfg run

    • E. 

      Copy tftp run

    • F. 

      Copy run ATL-1.cfg

    Correct Answer
    E. Copy tftp run
    Explanation
    The correct answer is "copy tftp run" because this command is used to copy a file from a TFTP server to the running-config on the router. The "tftp" keyword indicates the source of the file, which is the TFTP server, and the "run" keyword indicates the destination, which is the running-config on the router.

    Rate this question:

  • 23. 

    Which of the following are characteristics of a switch?

    • A. 

      A switch reads the IP address in a packet and makes forwarding decisions based on that address.

    • B. 

      The collision domain on a switch is all devices connected to a single switch port.

    • C. 

      The collision domain on a switch is all devices connected to the switch.

    • D. 

      A switch reads the MAC address in a frame and makes forwarding decisions based on that address.

    Correct Answer(s)
    B. The collision domain on a switch is all devices connected to a single switch port.
    D. A switch reads the MAC address in a frame and makes forwarding decisions based on that address.
    Explanation
    A switch reads the MAC address in a frame and makes forwarding decisions based on that address. This is because a switch operates at the data link layer of the OSI model and uses MAC addresses to determine where to forward incoming frames. The collision domain on a switch is all devices connected to a single switch port. This means that devices connected to different switch ports will have separate collision domains, reducing the chances of collisions and improving network performance.

    Rate this question:

  • 24. 

    Which internal routing logic organizes routing data using a tree structure for very fast searches, requiring less time to route packets?

    • A. 

      Cisco Express Forwarding

    • B. 

      Process Switching

    • C. 

      Store and Forward

    • D. 

      Fast Switching

    Correct Answer
    A. Cisco Express Forwarding
    Explanation
    Cisco Express Forwarding (CEF) is an internal routing logic that organizes routing data using a tree structure for very fast searches. It improves the efficiency of packet forwarding by maintaining a Forwarding Information Base (FIB) and an adjacency table. CEF allows for faster packet routing as it does not require the router to perform a route lookup for every packet, reducing the time needed to route packets. It is a key feature in Cisco routers and is commonly used in high-performance networks.

    Rate this question:

  • 25. 

    A Cisco router boots but cannot locate a valid IOS image in the flash memory or on a TFTP server. Assuming the default configuration, what will the router do next?

    • A. 

      Stop with an IOS image load error

    • B. 

      Enter setup mode

    • C. 

      Prompt you for the location of a valid IOS image

    • D. 

      Enter ROM monitor mode

    Correct Answer
    D. Enter ROM monitor mode
    Explanation
    When a Cisco router fails to locate a valid IOS image in the flash memory or on a TFTP server, it will enter ROM monitor mode. In this mode, the router allows the user to perform low-level troubleshooting and recovery tasks. From the ROM monitor mode, the user can then proceed to load a valid IOS image onto the router.

    Rate this question:

Back to Top Back to top
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.